{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:08:06Z","timestamp":1725653286468},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/wowmom.2013.6583372","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:19:46Z","timestamp":1383074386000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced multi-domain access control for secure mobile collaboration through Linked Data cloud in manufacturing"],"prefix":"10.1109","author":[{"given":"Patricia","family":"Ortiz","sequence":"first","affiliation":[]},{"given":"Oscar","family":"Lazaro","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Uriarte","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Carnerero","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref31","article-title":"ComVantage Project"},{"key":"ref30","article-title":"eXtensive Access Control Markup Language (XACML)","author":"godik","year":"2008","journal-title":"OASIS Standard"},{"key":"ref10","article-title":"Policy based access control for a RDF store","author":"reddivari","year":"2005","journal-title":"Proc Of the Policy Management for the Web Workshop Series"},{"year":"0","key":"ref11","article-title":"Tap project knowledge base"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372099"},{"article-title":"Identifying security issues in the semantic web: Injection attacks in the semantic query languages","year":"0","author":"ordu\u00f1a","key":"ref13"},{"key":"ref14","article-title":"Sesame: A generic architecture for storing and querying RDF and RDF schema","author":"broekstra","year":"2002","journal-title":"ISWC"},{"year":"0","key":"ref15","article-title":"Jena 2 inference support"},{"key":"ref16","first-page":"554","article-title":"Role-based access control","author":"ferraiolo","year":"1992","journal-title":"15th National Computer Security Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03095-6_65","article-title":"A semantic-aware attribute-based access control model for web services","author":"shen","year":"2009","journal-title":"ICA3PP '09 Proceedings of the th International Conference on Algorithms and Architectures for Parallel Processing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2011.01.03"},{"key":"ref28","article-title":"Inference-Based Access Control for Unstructured Data","author":"stinson","year":"2009","journal-title":"Stanford Security Workshop"},{"key":"ref4","article-title":"Containing the semantic explosion","author":"murdock","year":"2012","journal-title":"Philo"},{"journal-title":"Proc Linked Data on the Web Workshop","article-title":"Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores","year":"2012","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2007.22"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15877-3_12"},{"year":"0","key":"ref29","article-title":"AllegroGraph RDFStore Web 3.0's Database"},{"article-title":"RDF semantics. W3C Recommendation","year":"2004","author":"hayes","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2003.07.004"},{"year":"0","key":"ref7","article-title":"Linking Open Data. W3C SWEO Community Project"},{"article-title":"Technology adoption in midsize wholesale Distributors","year":"2012","author":"ellis","key":"ref2"},{"year":"0","key":"ref9","article-title":"Kowari metastore"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2009.05.006"},{"article-title":"Experience-based access managerncnt","year":"2011","author":"gunter","key":"ref20"},{"key":"ref22","article-title":"Secure resource description framework: an access control model","author":"amit","year":"2006","journal-title":"SACMAT '06 Proc of the eleventh ACM symposium on Access control models and technologies"},{"key":"ref21","article-title":"Enabling trust and privacy on the social web","author":"passant","year":"2009","journal-title":"W3C Workshop on the Future of Social Networking"},{"key":"ref24","article-title":"A Privacy Preference Ontology (PPO) for Linked Data","author":"sacco","year":"2011","journal-title":"Procs of the 4th Workshop about Linked Data on the Web"},{"year":"0","key":"ref23","article-title":"RDF. Suite of W3C REcommendations"},{"year":"0","key":"ref26","article-title":"OASIS Security Services (SAML) TC"},{"year":"0","author":"costabello","key":"ref25"}],"event":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2013,6,4]]},"location":"Madrid","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570845\/6583357\/06583372.pdf?arnumber=6583372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T09:10:42Z","timestamp":1564564242000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2013.6583372","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}